#VU49147 OS Command Injection in QuTS hero and QNAP QTS


Published: 2020-12-24

Vulnerability identifier: #VU49147

Vulnerability risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-25847

CWE-ID: CWE-78

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
QuTS hero
Hardware solutions / Firmware
QNAP QTS
Server applications / File servers (FTP/HTTP)

Vendor: QNAP Systems, Inc.

Description

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation. A remote unauthenticated attacker can pass specially crafted data to the application and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

QuTS hero: h4.5.0.1279 build 20200421 - h4.5.1.1472 build 20201031

QNAP QTS: 4.5.1.1456 20201015 - 4.5.1.1480 20201108, 4.4.0.0752 20181112 - 4.4.3.1444 20200930


External links
http://www.qnap.com/en/security-advisory/qsa-20-18


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability